Xerox
®
WorkCentre
®
4265 Multifunction Printer 49
System Administrator Guide
This chapter includes:
• Setting Access Rights .......................................................................................................................................................... 50
• Configuring Authentication Settings ........................................................................................................................... 52
• About User Permissions ..................................................................................................................................................... 58
• Enabling Xerox
®
Standard Accounting ....................................................................................................................... 59
• Configuring the Log Out Confirmation Screen ....................................................................................................... 60
• Secure HTTP (SSL) ................................................................................................................................................................ 61
• FIPS 140-2 ............................................................................................................................................................................... 62
• IP Filtering ............................................................................................................................................................................... 63
• Managing the Audit Log ................................................................................................................................................... 64
• IPsec .......................................................................................................................................................................................... 65
• 802.1X ....................................................................................................................................................................................... 66
• System Timeout .................................................................................................................................................................... 68
• Overwriting Image Data ................................................................................................................................................... 69
• USB Port Security ................................................................................................................................................................. 71
• Displaying or Hiding Network Settings ....................................................................................................................... 72
•
Security Certificates ............................................................................................................................................................ 73
See also:
www.xerox.com/security
Security